Computer Science
secure multiparty computation
100%
Secret Sharing
47%
Communication Complexity
41%
Information Retrieval
38%
Cryptographic Primitive
33%
secret sharing scheme
30%
Knowledge Proof
29%
Obfuscation
25%
Secure Protocol
24%
Boolean Circuit
23%
Hash Function
22%
Security Parameter
20%
Arithmetic Circuit
20%
Encryption Scheme
16%
Cryptographic Application
15%
Polynomial Time
13%
Malicious Adversary
12%
Cryptographic Protocol
12%
Function Point
12%
Soundness
11%
Hashing
11%
Homomorphic Encryption
11%
Protocol Message
10%
Linear Function
10%
Arbitrary Number
10%
random oracle model
10%
public-key encryption
10%
Boolean Function
9%
Communication Cost
9%
public key
9%
Computational Cost
9%
information theoretic security
9%
Approximation (Algorithm)
9%
Function Evaluation
8%
Access Structure
8%
Computational Complexity
8%
Time Computable Function
7%
Complexity Class
7%
Proof System
7%
Fully Homomorphic Encryption
7%
Online Communication
7%
Minimal Distance
6%
Public-Key Cryptography
6%
Learning with Errors
6%
Perfect Security
6%
side-channel
5%
Symmetric Encryption
5%
Communication Overhead
5%
Binary Symmetric Channel
5%
Existing Protocol
5%
Mathematics
Number
24%
Black Box
21%
Polynomial
20%
One-Way Function
16%
Hash Function
12%
Main Result
12%
Indistinguishability
10%
Intractability
8%
Approximates
7%
Input Bit
7%
Linear Code
7%
Integer
6%
Point Function
6%
Probability Theory
5%